ID

VAR-201711-0007


CVE

CVE-2016-8610


TITLE

OpenSSL  Service operation interruption in  (DoS)  Vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2016-008860

DESCRIPTION

A denial of service flaw was found in OpenSSL 0.9.8, 1.0.1, 1.0.2 through 1.0.2h, and 1.1.0 in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections from other clients. It supports a variety of encryption algorithms, including symmetric ciphers, hash algorithms, security hashing algorithm, etc. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: openssl security update Advisory ID: RHSA-2017:0286-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2017-0286.html Issue date: 2017-02-20 CVE Names: CVE-2016-8610 CVE-2017-3731 ===================================================================== 1. Summary: An update for openssl is now available for Red Hat Enterprise Linux 6 and Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client (v. 7) - x86_64 Red Hat Enterprise Linux Client Optional (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode Optional (v. 7) - x86_64 Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server (v. 7) - aarch64, ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 7) - aarch64, ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 7) - x86_64 3. Description: OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library. Security Fix(es): * An integer underflow leading to an out of bounds read flaw was found in OpenSSL. (CVE-2016-8610) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 For the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted. 5. Bugs fixed (https://bugzilla.redhat.com/): 1384743 - CVE-2016-8610 SSL/TLS: Malformed plain-text ALERT packets could cause remote DoS 1416852 - CVE-2017-3731 openssl: Truncated packet could crash via OOB read 6. Package List: Red Hat Enterprise Linux Desktop (v. 6): Source: openssl-1.0.1e-48.el6_8.4.src.rpm i386: openssl-1.0.1e-48.el6_8.4.i686.rpm openssl-debuginfo-1.0.1e-48.el6_8.4.i686.rpm x86_64: openssl-1.0.1e-48.el6_8.4.i686.rpm openssl-1.0.1e-48.el6_8.4.x86_64.rpm openssl-debuginfo-1.0.1e-48.el6_8.4.i686.rpm openssl-debuginfo-1.0.1e-48.el6_8.4.x86_64.rpm Red Hat Enterprise Linux Desktop Optional (v. 6): i386: openssl-debuginfo-1.0.1e-48.el6_8.4.i686.rpm openssl-devel-1.0.1e-48.el6_8.4.i686.rpm openssl-perl-1.0.1e-48.el6_8.4.i686.rpm openssl-static-1.0.1e-48.el6_8.4.i686.rpm x86_64: openssl-debuginfo-1.0.1e-48.el6_8.4.i686.rpm openssl-debuginfo-1.0.1e-48.el6_8.4.x86_64.rpm openssl-devel-1.0.1e-48.el6_8.4.i686.rpm openssl-devel-1.0.1e-48.el6_8.4.x86_64.rpm openssl-perl-1.0.1e-48.el6_8.4.x86_64.rpm openssl-static-1.0.1e-48.el6_8.4.x86_64.rpm Red Hat Enterprise Linux HPC Node (v. 6): Source: openssl-1.0.1e-48.el6_8.4.src.rpm x86_64: openssl-1.0.1e-48.el6_8.4.i686.rpm openssl-1.0.1e-48.el6_8.4.x86_64.rpm openssl-debuginfo-1.0.1e-48.el6_8.4.i686.rpm openssl-debuginfo-1.0.1e-48.el6_8.4.x86_64.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): x86_64: openssl-debuginfo-1.0.1e-48.el6_8.4.i686.rpm openssl-debuginfo-1.0.1e-48.el6_8.4.x86_64.rpm openssl-devel-1.0.1e-48.el6_8.4.i686.rpm openssl-devel-1.0.1e-48.el6_8.4.x86_64.rpm openssl-perl-1.0.1e-48.el6_8.4.x86_64.rpm openssl-static-1.0.1e-48.el6_8.4.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: openssl-1.0.1e-48.el6_8.4.src.rpm i386: openssl-1.0.1e-48.el6_8.4.i686.rpm openssl-debuginfo-1.0.1e-48.el6_8.4.i686.rpm openssl-devel-1.0.1e-48.el6_8.4.i686.rpm ppc64: openssl-1.0.1e-48.el6_8.4.ppc.rpm openssl-1.0.1e-48.el6_8.4.ppc64.rpm openssl-debuginfo-1.0.1e-48.el6_8.4.ppc.rpm openssl-debuginfo-1.0.1e-48.el6_8.4.ppc64.rpm openssl-devel-1.0.1e-48.el6_8.4.ppc.rpm openssl-devel-1.0.1e-48.el6_8.4.ppc64.rpm s390x: openssl-1.0.1e-48.el6_8.4.s390.rpm openssl-1.0.1e-48.el6_8.4.s390x.rpm openssl-debuginfo-1.0.1e-48.el6_8.4.s390.rpm openssl-debuginfo-1.0.1e-48.el6_8.4.s390x.rpm openssl-devel-1.0.1e-48.el6_8.4.s390.rpm openssl-devel-1.0.1e-48.el6_8.4.s390x.rpm x86_64: openssl-1.0.1e-48.el6_8.4.i686.rpm openssl-1.0.1e-48.el6_8.4.x86_64.rpm openssl-debuginfo-1.0.1e-48.el6_8.4.i686.rpm openssl-debuginfo-1.0.1e-48.el6_8.4.x86_64.rpm openssl-devel-1.0.1e-48.el6_8.4.i686.rpm openssl-devel-1.0.1e-48.el6_8.4.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 6): i386: openssl-debuginfo-1.0.1e-48.el6_8.4.i686.rpm openssl-perl-1.0.1e-48.el6_8.4.i686.rpm openssl-static-1.0.1e-48.el6_8.4.i686.rpm ppc64: openssl-debuginfo-1.0.1e-48.el6_8.4.ppc64.rpm openssl-perl-1.0.1e-48.el6_8.4.ppc64.rpm openssl-static-1.0.1e-48.el6_8.4.ppc64.rpm s390x: openssl-debuginfo-1.0.1e-48.el6_8.4.s390x.rpm openssl-perl-1.0.1e-48.el6_8.4.s390x.rpm openssl-static-1.0.1e-48.el6_8.4.s390x.rpm x86_64: openssl-debuginfo-1.0.1e-48.el6_8.4.x86_64.rpm openssl-perl-1.0.1e-48.el6_8.4.x86_64.rpm openssl-static-1.0.1e-48.el6_8.4.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: openssl-1.0.1e-48.el6_8.4.src.rpm i386: openssl-1.0.1e-48.el6_8.4.i686.rpm openssl-debuginfo-1.0.1e-48.el6_8.4.i686.rpm openssl-devel-1.0.1e-48.el6_8.4.i686.rpm x86_64: openssl-1.0.1e-48.el6_8.4.i686.rpm openssl-1.0.1e-48.el6_8.4.x86_64.rpm openssl-debuginfo-1.0.1e-48.el6_8.4.i686.rpm openssl-debuginfo-1.0.1e-48.el6_8.4.x86_64.rpm openssl-devel-1.0.1e-48.el6_8.4.i686.rpm openssl-devel-1.0.1e-48.el6_8.4.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 6): i386: openssl-debuginfo-1.0.1e-48.el6_8.4.i686.rpm openssl-perl-1.0.1e-48.el6_8.4.i686.rpm openssl-static-1.0.1e-48.el6_8.4.i686.rpm x86_64: openssl-debuginfo-1.0.1e-48.el6_8.4.x86_64.rpm openssl-perl-1.0.1e-48.el6_8.4.x86_64.rpm openssl-static-1.0.1e-48.el6_8.4.x86_64.rpm Red Hat Enterprise Linux Client (v. 7): Source: openssl-1.0.1e-60.el7_3.1.src.rpm x86_64: openssl-1.0.1e-60.el7_3.1.x86_64.rpm openssl-debuginfo-1.0.1e-60.el7_3.1.i686.rpm openssl-debuginfo-1.0.1e-60.el7_3.1.x86_64.rpm openssl-libs-1.0.1e-60.el7_3.1.i686.rpm openssl-libs-1.0.1e-60.el7_3.1.x86_64.rpm Red Hat Enterprise Linux Client Optional (v. 7): x86_64: openssl-debuginfo-1.0.1e-60.el7_3.1.i686.rpm openssl-debuginfo-1.0.1e-60.el7_3.1.x86_64.rpm openssl-devel-1.0.1e-60.el7_3.1.i686.rpm openssl-devel-1.0.1e-60.el7_3.1.x86_64.rpm openssl-perl-1.0.1e-60.el7_3.1.x86_64.rpm openssl-static-1.0.1e-60.el7_3.1.i686.rpm openssl-static-1.0.1e-60.el7_3.1.x86_64.rpm Red Hat Enterprise Linux ComputeNode (v. 7): Source: openssl-1.0.1e-60.el7_3.1.src.rpm x86_64: openssl-1.0.1e-60.el7_3.1.x86_64.rpm openssl-debuginfo-1.0.1e-60.el7_3.1.i686.rpm openssl-debuginfo-1.0.1e-60.el7_3.1.x86_64.rpm openssl-libs-1.0.1e-60.el7_3.1.i686.rpm openssl-libs-1.0.1e-60.el7_3.1.x86_64.rpm Red Hat Enterprise Linux ComputeNode Optional (v. 7): x86_64: openssl-debuginfo-1.0.1e-60.el7_3.1.i686.rpm openssl-debuginfo-1.0.1e-60.el7_3.1.x86_64.rpm openssl-devel-1.0.1e-60.el7_3.1.i686.rpm openssl-devel-1.0.1e-60.el7_3.1.x86_64.rpm openssl-perl-1.0.1e-60.el7_3.1.x86_64.rpm openssl-static-1.0.1e-60.el7_3.1.i686.rpm openssl-static-1.0.1e-60.el7_3.1.x86_64.rpm Red Hat Enterprise Linux Server (v. 7): Source: openssl-1.0.1e-60.el7_3.1.src.rpm aarch64: openssl-1.0.1e-60.el7_3.1.aarch64.rpm openssl-debuginfo-1.0.1e-60.el7_3.1.aarch64.rpm openssl-devel-1.0.1e-60.el7_3.1.aarch64.rpm openssl-libs-1.0.1e-60.el7_3.1.aarch64.rpm ppc64: openssl-1.0.1e-60.el7_3.1.ppc64.rpm openssl-debuginfo-1.0.1e-60.el7_3.1.ppc.rpm openssl-debuginfo-1.0.1e-60.el7_3.1.ppc64.rpm openssl-devel-1.0.1e-60.el7_3.1.ppc.rpm openssl-devel-1.0.1e-60.el7_3.1.ppc64.rpm openssl-libs-1.0.1e-60.el7_3.1.ppc.rpm openssl-libs-1.0.1e-60.el7_3.1.ppc64.rpm ppc64le: openssl-1.0.1e-60.el7_3.1.ppc64le.rpm openssl-debuginfo-1.0.1e-60.el7_3.1.ppc64le.rpm openssl-devel-1.0.1e-60.el7_3.1.ppc64le.rpm openssl-libs-1.0.1e-60.el7_3.1.ppc64le.rpm s390x: openssl-1.0.1e-60.el7_3.1.s390x.rpm openssl-debuginfo-1.0.1e-60.el7_3.1.s390.rpm openssl-debuginfo-1.0.1e-60.el7_3.1.s390x.rpm openssl-devel-1.0.1e-60.el7_3.1.s390.rpm openssl-devel-1.0.1e-60.el7_3.1.s390x.rpm openssl-libs-1.0.1e-60.el7_3.1.s390.rpm openssl-libs-1.0.1e-60.el7_3.1.s390x.rpm x86_64: openssl-1.0.1e-60.el7_3.1.x86_64.rpm openssl-debuginfo-1.0.1e-60.el7_3.1.i686.rpm openssl-debuginfo-1.0.1e-60.el7_3.1.x86_64.rpm openssl-devel-1.0.1e-60.el7_3.1.i686.rpm openssl-devel-1.0.1e-60.el7_3.1.x86_64.rpm openssl-libs-1.0.1e-60.el7_3.1.i686.rpm openssl-libs-1.0.1e-60.el7_3.1.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 7): aarch64: openssl-debuginfo-1.0.1e-60.el7_3.1.aarch64.rpm openssl-perl-1.0.1e-60.el7_3.1.aarch64.rpm openssl-static-1.0.1e-60.el7_3.1.aarch64.rpm ppc64: openssl-debuginfo-1.0.1e-60.el7_3.1.ppc.rpm openssl-debuginfo-1.0.1e-60.el7_3.1.ppc64.rpm openssl-perl-1.0.1e-60.el7_3.1.ppc64.rpm openssl-static-1.0.1e-60.el7_3.1.ppc.rpm openssl-static-1.0.1e-60.el7_3.1.ppc64.rpm ppc64le: openssl-debuginfo-1.0.1e-60.el7_3.1.ppc64le.rpm openssl-perl-1.0.1e-60.el7_3.1.ppc64le.rpm openssl-static-1.0.1e-60.el7_3.1.ppc64le.rpm s390x: openssl-debuginfo-1.0.1e-60.el7_3.1.s390.rpm openssl-debuginfo-1.0.1e-60.el7_3.1.s390x.rpm openssl-perl-1.0.1e-60.el7_3.1.s390x.rpm openssl-static-1.0.1e-60.el7_3.1.s390.rpm openssl-static-1.0.1e-60.el7_3.1.s390x.rpm x86_64: openssl-debuginfo-1.0.1e-60.el7_3.1.i686.rpm openssl-debuginfo-1.0.1e-60.el7_3.1.x86_64.rpm openssl-perl-1.0.1e-60.el7_3.1.x86_64.rpm openssl-static-1.0.1e-60.el7_3.1.i686.rpm openssl-static-1.0.1e-60.el7_3.1.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 7): Source: openssl-1.0.1e-60.el7_3.1.src.rpm x86_64: openssl-1.0.1e-60.el7_3.1.x86_64.rpm openssl-debuginfo-1.0.1e-60.el7_3.1.i686.rpm openssl-debuginfo-1.0.1e-60.el7_3.1.x86_64.rpm openssl-devel-1.0.1e-60.el7_3.1.i686.rpm openssl-devel-1.0.1e-60.el7_3.1.x86_64.rpm openssl-libs-1.0.1e-60.el7_3.1.i686.rpm openssl-libs-1.0.1e-60.el7_3.1.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 7): x86_64: openssl-debuginfo-1.0.1e-60.el7_3.1.i686.rpm openssl-debuginfo-1.0.1e-60.el7_3.1.x86_64.rpm openssl-perl-1.0.1e-60.el7_3.1.x86_64.rpm openssl-static-1.0.1e-60.el7_3.1.i686.rpm openssl-static-1.0.1e-60.el7_3.1.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2016-8610 https://access.redhat.com/security/cve/CVE-2017-3731 https://access.redhat.com/security/updates/classification/#moderate https://www.openssl.org/news/secadv/20170126.txt 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2017 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFYqs1TXlSAg2UNWIIRAt7bAJ0ZCDFTFcNP3/qrBxA46aRJQAvxkACaA9Ak 1zK4rWazcUYTZw5zQhD4SXA= =I+Z7 -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . This software, such as Apache HTTP Server, is common to multiple JBoss middleware products, and is packaged under Red Hat JBoss Core Services to allow for faster distribution of updates, and for a more consistent update experience. Security Fix(es): * A memory leak flaw was found in the way OpenSSL handled TLS status request extension data during session renegotiation. A remote attacker could cause a TLS server using OpenSSL to consume an excessive amount of memory and, possibly, exit unexpectedly after exhausting all available memory, if it enabled OCSP stapling support. (CVE-2016-6304) * It was discovered that the mod_session_crypto module of httpd did not use any mechanisms to verify integrity of the encrypted session data stored in the user's browser. (CVE-2016-0736) * It was discovered that the mod_auth_digest module of httpd did not properly check for memory allocation failures. (CVE-2016-2161) * A timing attack flaw was found in OpenSSL that could allow a malicious user with local access to recover ECDSA P-256 private keys. (CVE-2016-8610) * It was discovered that the HTTP parser in httpd incorrectly allowed certain characters not permitted by the HTTP protocol specification to appear unencoded in HTTP request headers. If httpd was used in conjunction with a proxy or backend server that interpreted those characters differently, a remote attacker could possibly use this flaw to inject data into HTTP responses, resulting in proxy cache poisoning. (CVE-2016-8743) * A vulnerability was found in httpd's handling of the LimitRequestFields directive in mod_http2, affecting servers with HTTP/2 enabled. (CVE-2016-8740) Red Hat would like to thank the OpenSSL project for reporting CVE-2016-6304 and Shi Lei (Gear Team of Qihoo 360 Inc.) for reporting CVE-2016-8610. Upstream acknowledges Shi Lei (Gear Team of Qihoo 360 Inc.) as the original reporter of CVE-2016-6304. After installing the updated packages, the httpd daemon will be restarted automatically. Bugs fixed (https://bugzilla.redhat.com/): 1377600 - CVE-2016-6304 openssl: OCSP Status Request extension unbounded memory growth 1384743 - CVE-2016-8610 SSL/TLS: Malformed plain-text ALERT packets could cause remote DoS 1401528 - CVE-2016-8740 httpd: Incomplete handling of LimitRequestFields directive in mod_http2 1406744 - CVE-2016-0736 httpd: Padding Oracle in Apache mod_session_crypto 1406753 - CVE-2016-2161 httpd: DoS vulnerability in mod_auth_digest 1406822 - CVE-2016-8743 httpd: Apache HTTP Request Parsing Whitespace Defects 1412120 - CVE-2016-7056 openssl: ECDSA P-256 timing attack key recovery 6. JIRA issues fixed (https://issues.jboss.org/): JBCS-319 - Errata for httpd 2.4.23 SP1 RHEL 7 7. Apache Tomcat is a servlet container for the Java Servlet and JavaServer Pages (JSP) technologies. If sendfile processing completed quickly, it was possible for the Processor to be added to the processor cache twice. This could lead to invalid responses or information disclosure. (CVE-2017-5647) * A vulnerability was discovered in the error page mechanism in Tomcat's DefaultServlet implementation. A crafted HTTP request could cause undesired side effects, possibly including the removal or replacement of the custom error page. Solution: Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files). CVE-2016-8610 It was discovered that no limit was imposed on alert packets during an SSL handshake. CVE-2017-3731 Robert Swiecki discovered that the RC4-MD5 cipher when running on 32 bit systems could be forced into an out-of-bounds read, resulting in denial of service. For the stable distribution (jessie), these problems have been fixed in version 1.0.1t-1+deb8u6. For the unstable distribution (sid), these problems have been fixed in version 1.1.0d-1 of the openssl source package and in version 1.0.2k-1 of the openssl1.0 source package. We recommend that you upgrade your openssl packages. 6) - i386, x86_64 3. The following packages have been upgraded to a later upstream version: gnutls (2.12.23). (CVE-2016-8610) * Multiple flaws were found in the way gnutls processed OpenPGP certificates. An attacker could create specially crafted OpenPGP certificates which, when parsed by gnutls, would cause it to crash. Bugs fixed (https://bugzilla.redhat.com/): 1320982 - ASSERT failure in gnutls-cli-debug 1321112 - DHE_DSS ciphers don't work with client certificates and OpenSSL using TLSv1.2 1323215 - gnutls-serv --http crashes with client certificates with NSS client 1326073 - GnuTLS prefers SHA-1 signatures in TLSv1.2 1326389 - GnuTLS server does not accept SHA-384 and SHA-512 Certificate Verify signatures despite advertising support for them 1326886 - GnuTLS server rejects connections that do not advertise support for SHA-1 signature algorithms 1327656 - gnutls-serv: closing connection without sending an Alert message 1328205 - gnutls-cli won't send certificates that don't match hashes in Certificate Request 1333521 - Provide ability to set the expected server name in gnutls-serv utility 1335924 - gnutls: Disable TLS connections with less than 1024-bit DH parameters 1337460 - Disable/remove export ciphersuites in GnuTLS 1384743 - CVE-2016-8610 SSL/TLS: Malformed plain-text ALERT packets could cause remote DoS 1411836 - CVE-2017-5337 gnutls: Heap read overflow in read-packet.c 1412235 - CVE-2017-5335 gnutls: Out of memory while parsing crafted OpenPGP certificate 1412236 - CVE-2017-5336 gnutls: Stack overflow in cdk_pk_get_keyid 1415682 - Changes introduced by rebase to 2.12.23 break API and ABI compatibility for some libraries 6. =========================================================================== Ubuntu Security Notice USN-3183-2 March 20, 2017 gnutls26 vulnerability =========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 14.04 LTS - Ubuntu 12.04 LTS Summary: GnuTLS could be made to hang if it received specially crafted network traffic. Software Description: - gnutls26: GNU TLS library Details: USN-3183-1 fixed CVE-2016-8610 in GnuTLS in Ubuntu 16.04 LTS and Ubuntu 16.10. This update provides the corresponding update for Ubuntu 12.04 LTS and Ubuntu 14.04 LTS. Original advisory details: Stefan Buehler discovered that GnuTLS incorrectly verified the serial length of OCSP responses. This issue only applied to Ubuntu 16.04 LTS. (CVE-2016-7444) Shi Lei discovered that GnuTLS incorrectly handled certain warning alerts. This issue has only been addressed in Ubuntu 16.04 LTS and Ubuntu 16.10. (CVE-2016-8610) It was discovered that GnuTLS incorrectly decoded X.509 certificates with a Proxy Certificate Information extension. This issue only affected Ubuntu 16.04 LTS and Ubuntu 16.10. (CVE-2017-5334) It was discovered that GnuTLS incorrectly handled certain OpenPGP certificates. (CVE-2017-5335, CVE-2017-5336, CVE-2017-5337) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 14.04 LTS: libgnutls26 2.12.23-12ubuntu2.7 Ubuntu 12.04 LTS: libgnutls26 2.12.14-5ubuntu3.14 In general, a standard system update will make all the necessary changes

Trust: 2.61

sources: NVD: CVE-2016-8610 // JVNDB: JVNDB-2016-008860 // VULHUB: VHN-97430 // VULMON: CVE-2016-8610 // PACKETSTORM: 141173 // PACKETSTORM: 142848 // PACKETSTORM: 143874 // PACKETSTORM: 142847 // PACKETSTORM: 142849 // PACKETSTORM: 140781 // PACKETSTORM: 141752 // PACKETSTORM: 141708 // PACKETSTORM: 140890

AFFECTED PRODUCTS

vendor:opensslmodel:opensslscope:eqversion:1.0.1

Trust: 2.4

vendor:opensslmodel:opensslscope:eqversion:0.9.8

Trust: 2.4

vendor:opensslmodel:opensslscope:eqversion:1.1.0

Trust: 1.8

vendor:oraclemodel:retail predictive application serverscope:eqversion:16.0.3

Trust: 1.0

vendor:opensslmodel:opensslscope:gteversion:1.0.2

Trust: 1.0

vendor:oraclemodel:enterprise manager ops centerscope:eqversion:12.4.0

Trust: 1.0

vendor:fujitsumodel:m10-1scope:ltversion:xcp2361

Trust: 1.0

vendor:netappmodel:storagegridscope:eqversion: -

Trust: 1.0

vendor:oraclemodel:core rdbmsscope:eqversion:12.2.0.1

Trust: 1.0

vendor:redhatmodel:enterprise linux server ausscope:eqversion:7.4

Trust: 1.0

vendor:oraclemodel:application testing suitescope:eqversion:13.3.0.1

Trust: 1.0

vendor:oraclemodel:adaptive access managerscope:eqversion:11.1.2.3.0

Trust: 1.0

vendor:oraclemodel:core rdbmsscope:eqversion:18c

Trust: 1.0

vendor:fujitsumodel:m12-2sscope:ltversion:xcp2361

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:8.0

Trust: 1.0

vendor:fujitsumodel:m10-4sscope:ltversion:xcp3070

Trust: 1.0

vendor:netappmodel:oncommand unified managerscope:eqversion: -

Trust: 1.0

vendor:oraclemodel:communications ip service activatorscope:eqversion:7.4.0

Trust: 1.0

vendor:oraclemodel:core rdbmsscope:eqversion:19c

Trust: 1.0

vendor:redhatmodel:enterprise linux server ausscope:eqversion:7.3

Trust: 1.0

vendor:oraclemodel:timesten in-memory databasescope:ltversion:18.1.4.1.0

Trust: 1.0

vendor:redhatmodel:jboss enterprise application platformscope:eqversion:6.4.0

Trust: 1.0

vendor:netappmodel:cn1610scope:eqversion: -

Trust: 1.0

vendor:netappmodel:host agentscope:eqversion: -

Trust: 1.0

vendor:oraclemodel:retail predictive application serverscope:eqversion:15.0.3

Trust: 1.0

vendor:netappmodel:oncommand workflow automationscope:eqversion: -

Trust: 1.0

vendor:redhatmodel:enterprise linux server tusscope:eqversion:7.6

Trust: 1.0

vendor:netappmodel:ontap select deployscope:eqversion: -

Trust: 1.0

vendor:redhatmodel:enterprise linux server eusscope:eqversion:7.4

Trust: 1.0

vendor:fujitsumodel:m10-1scope:gteversion:xcp3000

Trust: 1.0

vendor:fujitsumodel:m12-2scope:ltversion:xcp3070

Trust: 1.0

vendor:netappmodel:data ontapscope:eqversion: -

Trust: 1.0

vendor:fujitsumodel:m12-2sscope:ltversion:xcp3070

Trust: 1.0

vendor:netappmodel:e-series santricity os controllerscope:lteversion:11.40

Trust: 1.0

vendor:netappmodel:snapdrivescope:eqversion: -

Trust: 1.0

vendor:oraclemodel:peoplesoft enterprise peopletoolsscope:eqversion:8.58

Trust: 1.0

vendor:netappmodel:snapcenter serverscope:eqversion: -

Trust: 1.0

vendor:redhatmodel:enterprise linux server eusscope:eqversion:7.3

Trust: 1.0

vendor:oraclemodel:peoplesoft enterprise peopletoolsscope:eqversion:8.57

Trust: 1.0

vendor:fujitsumodel:m10-4sscope:ltversion:xcp2361

Trust: 1.0

vendor:netappmodel:clustered data ontap antivirus connectorscope:eqversion: -

Trust: 1.0

vendor:fujitsumodel:m12-2scope:gteversion:xcp3000

Trust: 1.0

vendor:fujitsumodel:m12-2sscope:gteversion:xcp3000

Trust: 1.0

vendor:redhatmodel:enterprise linux desktopscope:eqversion:6.0

Trust: 1.0

vendor:oraclemodel:enterprise manager ops centerscope:eqversion:12.3.3

Trust: 1.0

vendor:netappmodel:e-series santricity os controllerscope:gteversion:11.0

Trust: 1.0

vendor:oraclemodel:communications analyticsscope:eqversion:12.1.1

Trust: 1.0

vendor:paloaltonetworksmodel:pan-osscope:lteversion:6.1.17

Trust: 1.0

vendor:fujitsumodel:m10-4scope:ltversion:xcp2361

Trust: 1.0

vendor:oraclemodel:weblogic serverscope:eqversion:12.2.1.4.0

Trust: 1.0

vendor:redhatmodel:enterprise linux server ausscope:eqversion:7.6

Trust: 1.0

vendor:fujitsumodel:m12-2scope:ltversion:xcp2361

Trust: 1.0

vendor:paloaltonetworksmodel:pan-osscope:lteversion:7.0.15

Trust: 1.0

vendor:netappmodel:data ontap edgescope:eqversion: -

Trust: 1.0

vendor:redhatmodel:enterprise linux desktopscope:eqversion:7.0

Trust: 1.0

vendor:oraclemodel:core rdbmsscope:eqversion:12.1.0.2

Trust: 1.0

vendor:fujitsumodel:m10-4sscope:gteversion:xcp3000

Trust: 1.0

vendor:oraclemodel:weblogic serverscope:eqversion:12.1.3.0.0

Trust: 1.0

vendor:netappmodel:oncommand balancescope:eqversion: -

Trust: 1.0

vendor:redhatmodel:enterprise linux workstationscope:eqversion:6.0

Trust: 1.0

vendor:fujitsumodel:m10-4scope:ltversion:xcp3070

Trust: 1.0

vendor:redhatmodel:enterprise linux serverscope:eqversion:6.0

Trust: 1.0

vendor:fujitsumodel:m12-1scope:ltversion:xcp3070

Trust: 1.0

vendor:fujitsumodel:m10-1scope:ltversion:xcp3070

Trust: 1.0

vendor:redhatmodel:enterprise linux server eusscope:eqversion:7.6

Trust: 1.0

vendor:netappmodel:storagegrid webscalescope:eqversion: -

Trust: 1.0

vendor:opensslmodel:opensslscope:lteversion:1.0.2h

Trust: 1.0

vendor:redhatmodel:jboss enterprise application platformscope:eqversion:6.0.0

Trust: 1.0

vendor:oraclemodel:core rdbmsscope:eqversion:11.2.0.4

Trust: 1.0

vendor:paloaltonetworksmodel:pan-osscope:lteversion:7.1.10

Trust: 1.0

vendor:oraclemodel:peoplesoft enterprise peopletoolsscope:eqversion:8.56

Trust: 1.0

vendor:paloaltonetworksmodel:pan-osscope:gteversion:7.0.0

Trust: 1.0

vendor:paloaltonetworksmodel:pan-osscope:gteversion:7.1.0

Trust: 1.0

vendor:oraclemodel:communications ip service activatorscope:eqversion:7.3.4

Trust: 1.0

vendor:fujitsumodel:m10-4scope:gteversion:xcp3000

Trust: 1.0

vendor:fujitsumodel:m12-1scope:gteversion:xcp3000

Trust: 1.0

vendor:redhatmodel:enterprise linux workstationscope:eqversion:7.0

Trust: 1.0

vendor:netappmodel:service processorscope:eqversion: -

Trust: 1.0

vendor:redhatmodel:enterprise linux server tusscope:eqversion:7.3

Trust: 1.0

vendor:netappmodel:smi-s providerscope:eqversion: -

Trust: 1.0

vendor:redhatmodel:enterprise linux serverscope:eqversion:7.0

Trust: 1.0

vendor:oraclemodel:weblogic serverscope:eqversion:10.3.6.0.0

Trust: 1.0

vendor:oraclemodel:weblogic serverscope:eqversion:12.2.1.3.0

Trust: 1.0

vendor:oraclemodel:jd edwards enterpriseone toolsscope:eqversion:9.2

Trust: 1.0

vendor:redhatmodel:enterprise linux server eusscope:eqversion:7.5

Trust: 1.0

vendor:netappmodel:clustered data ontapscope:eqversion: -

Trust: 1.0

vendor:oraclemodel:goldengate application adaptersscope:eqversion:12.3.2.1.0

Trust: 1.0

vendor:fujitsumodel:m12-1scope:ltversion:xcp2361

Trust: 1.0

vendor:opensslmodel:opensslscope:eqversion:1.0.2 to 1.0.2h

Trust: 0.8

vendor:opensslmodel:opensslscope:eqversion: -

Trust: 0.8

vendor:opensslmodel:opensslscope:eqversion:1.0.2b

Trust: 0.6

vendor:opensslmodel:opensslscope:eqversion:1.0.2

Trust: 0.6

vendor:opensslmodel:opensslscope:eqversion:1.0.2a

Trust: 0.6

vendor:opensslmodel:opensslscope:eqversion:1.0.2c

Trust: 0.6

vendor:opensslmodel:opensslscope:eqversion:1.0.2d

Trust: 0.6

sources: JVNDB: JVNDB-2016-008860 // CNNVD: CNNVD-201610-726 // NVD: CVE-2016-8610

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2016-8610
value: HIGH

Trust: 1.0

NVD: CVE-2016-8610
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201610-726
value: HIGH

Trust: 0.6

VULHUB: VHN-97430
value: MEDIUM

Trust: 0.1

VULMON: CVE-2016-8610
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2016-8610
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-97430
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2016-8610
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.1

Trust: 1.0

NVD: CVE-2016-8610
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-97430 // VULMON: CVE-2016-8610 // JVNDB: JVNDB-2016-008860 // CNNVD: CNNVD-201610-726 // NVD: CVE-2016-8610

PROBLEMTYPE DATA

problemtype:CWE-400

Trust: 1.1

problemtype:Resource exhaustion (CWE-400) [NVD evaluation ]

Trust: 0.8

problemtype:CWE-399

Trust: 0.1

sources: VULHUB: VHN-97430 // JVNDB: JVNDB-2016-008860 // NVD: CVE-2016-8610

THREAT TYPE

remote

Trust: 1.0

sources: PACKETSTORM: 141173 // PACKETSTORM: 141752 // PACKETSTORM: 141708 // PACKETSTORM: 140890 // CNNVD: CNNVD-201610-726

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-201610-726

PATCH

title:Don't allow too many consecutive warning alerts Red hat Red Hat Bugzillaurl:https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=af58be768ebb690f78530f796e92b8ae5c9a4401

Trust: 0.8

title:OpenSSL Remediation measures for denial of service vulnerabilitiesurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=65089

Trust: 0.6

title:Red Hat: Moderate: openssl security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20170286 - Security Advisory

Trust: 0.1

title:Red Hat: Important: Red Hat JBoss Enterprise Application Platform 6.4.16 natives updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20171659 - Security Advisory

Trust: 0.1

title:Red Hat: Moderate: gnutls security, bug fix, and enhancement updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20170574 - Security Advisory

Trust: 0.1

title:Red Hat: Important: Red Hat JBoss Enterprise Application Platform 6.4.16 natives updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20171658 - Security Advisory

Trust: 0.1

title:Red Hat: Important: Red Hat JBoss Core Services Apache HTTP Server 2.4.23 Service Pack 1 for RHEL 6url:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20171414 - Security Advisory

Trust: 0.1

title:Red Hat: Important: Red Hat JBoss Core Services Apache HTTP Server 2.4.23 Service Pack 1url:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20171415 - Security Advisory

Trust: 0.1

title:Red Hat: Important: Red Hat JBoss Core Services Apache HTTP Server 2.4.23 Service Pack 1 for RHEL 7url:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20171413 - Security Advisory

Trust: 0.1

title:Debian Security Advisories: DSA-3773-1 openssl -- security updateurl:https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=9f660812dd6a423f7e72aa57751d0031

Trust: 0.1

title:Red Hat: CVE-2016-8610url:https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database&qid=CVE-2016-8610

Trust: 0.1

title:Amazon Linux AMI: ALAS-2017-803url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami&qid=ALAS-2017-803

Trust: 0.1

title:Ubuntu Security Notice: gnutls26 vulnerabilityurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3183-2

Trust: 0.1

title:Ubuntu Security Notice: gnutls26, gnutls28 vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3183-1

Trust: 0.1

title:Ubuntu Security Notice: openssl vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-3181-1

Trust: 0.1

title:Red Hat: Important: Red Hat JBoss Web Server 3.1.0 Service Pack 1 security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20171801 - Security Advisory

Trust: 0.1

title:Red Hat: Important: Red Hat JBoss Web Server Service Pack 1 security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20171802 - Security Advisory

Trust: 0.1

title:Amazon Linux AMI: ALAS-2017-815url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami&qid=ALAS-2017-815

Trust: 0.1

title:Oracle Linux Bulletins: Oracle Linux Bulletin - January 2017url:https://vulmon.com/vendoradvisory?qidtp=oracle_linux_bulletins&qid=ecbe5f193404d1e9c62e8323118ae6cf

Trust: 0.1

title:Oracle VM Server for x86 Bulletins: Oracle VM Server for x86 Bulletin - January 2017url:https://vulmon.com/vendoradvisory?qidtp=oracle_vm_server_for_x86_bulletins&qid=04299a624c15ae57f9f110f484bc5f66

Trust: 0.1

title:Oracle Solaris Third Party Bulletins: Oracle Solaris Third Party Bulletin - October 2016url:https://vulmon.com/vendoradvisory?qidtp=oracle_solaris_third_party_bulletins&qid=6839c4d3fd328571c675c335d58b5591

Trust: 0.1

title:Oracle Linux Bulletins: Oracle Linux Bulletin - April 2017url:https://vulmon.com/vendoradvisory?qidtp=oracle_linux_bulletins&qid=d78b3379ca364568964f30138964c7e7

Trust: 0.1

title:Oracle VM Server for x86 Bulletins: Oracle VM Server for x86 Bulletin - April 2017url:https://vulmon.com/vendoradvisory?qidtp=oracle_vm_server_for_x86_bulletins&qid=bf8deceb640f4a0fee008855afe6aa85

Trust: 0.1

title:CVE-2016-8610-PoCurl:https://github.com/cujanovic/CVE-2016-8610-PoC

Trust: 0.1

sources: VULMON: CVE-2016-8610 // JVNDB: JVNDB-2016-008860 // CNNVD: CNNVD-201610-726

EXTERNAL IDS

db:NVDid:CVE-2016-8610

Trust: 4.3

db:BIDid:93841

Trust: 1.8

db:SECTRACKid:1037084

Trust: 1.8

db:JVNDBid:JVNDB-2016-008860

Trust: 0.8

db:CNNVDid:CNNVD-201610-726

Trust: 0.7

db:AUSCERTid:ESB-2019.2173

Trust: 0.6

db:PACKETSTORMid:141173

Trust: 0.2

db:PACKETSTORMid:141752

Trust: 0.2

db:SEEBUGid:SSVID-92490

Trust: 0.1

db:VULHUBid:VHN-97430

Trust: 0.1

db:VULMONid:CVE-2016-8610

Trust: 0.1

db:PACKETSTORMid:142848

Trust: 0.1

db:PACKETSTORMid:143874

Trust: 0.1

db:PACKETSTORMid:142847

Trust: 0.1

db:PACKETSTORMid:142849

Trust: 0.1

db:PACKETSTORMid:140781

Trust: 0.1

db:PACKETSTORMid:141708

Trust: 0.1

db:PACKETSTORMid:140890

Trust: 0.1

sources: VULHUB: VHN-97430 // VULMON: CVE-2016-8610 // JVNDB: JVNDB-2016-008860 // PACKETSTORM: 141173 // PACKETSTORM: 142848 // PACKETSTORM: 143874 // PACKETSTORM: 142847 // PACKETSTORM: 142849 // PACKETSTORM: 140781 // PACKETSTORM: 141752 // PACKETSTORM: 141708 // PACKETSTORM: 140890 // CNNVD: CNNVD-201610-726 // NVD: CVE-2016-8610

REFERENCES

url:http://www.securityfocus.com/bid/93841

Trust: 2.4

url:http://rhn.redhat.com/errata/rhsa-2017-0286.html

Trust: 1.9

url:http://rhn.redhat.com/errata/rhsa-2017-0574.html

Trust: 1.9

url:https://access.redhat.com/errata/rhsa-2017:1413

Trust: 1.9

url:https://access.redhat.com/errata/rhsa-2017:1414

Trust: 1.9

url:http://rhn.redhat.com/errata/rhsa-2017-1415.html

Trust: 1.9

url:https://access.redhat.com/errata/rhsa-2017:2493

Trust: 1.9

url:http://www.securitytracker.com/id/1037084

Trust: 1.8

url:https://www.debian.org/security/2017/dsa-3773

Trust: 1.8

url:https://security.freebsd.org/advisories/freebsd-sa-16:35.openssl.asc

Trust: 1.8

url:https://access.redhat.com/errata/rhsa-2017:1658

Trust: 1.8

url:http://rhn.redhat.com/errata/rhsa-2017-1659.html

Trust: 1.8

url:https://access.redhat.com/errata/rhsa-2017:1801

Trust: 1.8

url:https://access.redhat.com/errata/rhsa-2017:1802

Trust: 1.8

url:https://access.redhat.com/errata/rhsa-2017:2494

Trust: 1.8

url:http://seclists.org/oss-sec/2016/q4/224

Trust: 1.8

url:https://bugzilla.redhat.com/show_bug.cgi?id=cve-2016-8610

Trust: 1.8

url:https://git.openssl.org/gitweb/?p=openssl.git%3ba=commit%3bh=af58be768ebb690f78530f796e92b8ae5c9a4401

Trust: 1.8

url:https://security.360.cn/cve/cve-2016-8610/

Trust: 1.8

url:https://security.netapp.com/advisory/ntap-20171130-0001/

Trust: 1.8

url:https://security.paloaltonetworks.com/cve-2016-8610

Trust: 1.8

url:https://www.oracle.com/security-alerts/cpuapr2020.html

Trust: 1.8

url:https://www.oracle.com/security-alerts/cpujan2020.html

Trust: 1.8

url:https://www.oracle.com/security-alerts/cpujul2020.html

Trust: 1.8

url:https://www.oracle.com/security-alerts/cpuoct2020.html

Trust: 1.8

url:https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html

Trust: 1.8

url:https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html

Trust: 1.8

url:https://support.hpe.com/hpsc/doc/public/display?doclocale=en_us&docid=emr_na-hpesbhf03897en_us

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2016-8610

Trust: 1.7

url:https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.6

url:https://access.redhat.com/security/cve/cve-2016-8610

Trust: 0.6

url:https://bugzilla.redhat.com/):

Trust: 0.6

url:https://access.redhat.com/articles/11258

Trust: 0.6

url:https://access.redhat.com/security/team/contact/

Trust: 0.6

url:https://securityadvisories.paloaltonetworks.com/home/detail/87

Trust: 0.6

url:https://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=af58be768ebb690f78530f796e92b8ae5c9a4401

Trust: 0.6

url:https://www.suse.com/support/update/announcement/2019/suse-su-20191553-1.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2019.2173/

Trust: 0.6

url:https://access.redhat.com/security/team/key/

Trust: 0.5

url:https://access.redhat.com/security/updates/classification/#important

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2016-7056

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2016-6304

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2016-6304

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2016-8740

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2016-0736

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2016-8743

Trust: 0.3

url:https://access.redhat.com/documentation/en/red-hat-jboss-core-services/

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2016-8743

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2016-2161

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2016-8740

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2016-7056

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2016-0736

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2016-2161

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2017-3731

Trust: 0.2

url:https://access.redhat.com/security/updates/classification/#moderate

Trust: 0.2

url:https://issues.jboss.org/):

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2017-5337

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2017-5336

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2017-5335

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2017-5334

Trust: 0.2

url:http://www.ubuntu.com/usn/usn-3183-1

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2016-7444

Trust: 0.2

url:https://support.hpe.com/hpsc/doc/public/display?doclocale=en_us&amp;docid=emr_na-hpesbhf03897en_us

Trust: 0.1

url:https://cwe.mitre.org/data/definitions/400.html

Trust: 0.1

url:https://github.com/cujanovic/cve-2016-8610-poc

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:http://tools.cisco.com/security/center/viewalert.x?alertid=49575

Trust: 0.1

url:https://usn.ubuntu.com/3183-2/

Trust: 0.1

url:https://www.openssl.org/news/secadv/20170126.txt

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2017-3731

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2017-5664

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2017-5647

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-5647

Trust: 0.1

url:https://access.redhat.com/articles/3155411

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-5664

Trust: 0.1

url:https://access.redhat.com/jbossnetwork/restricted/listsoftware.html?product=core.service.apachehttp&downloadtype=securitypatches&version=2.4.23

Trust: 0.1

url:https://www.debian.org/security/faq

Trust: 0.1

url:https://www.debian.org/security/

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2017-5337

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2017-5336

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/6/html/6.9_release_notes/index.html

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/6/html/6.9_technical_notes/index.html

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2017-5335

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/gnutls26/2.12.23-12ubuntu2.7

Trust: 0.1

url:http://www.ubuntu.com/usn/usn-3183-2

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/gnutls26/2.12.14-5ubuntu3.14

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/gnutls28/3.4.10-4ubuntu1.2

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/gnutls26/2.12.23-12ubuntu2.6

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/gnutls28/3.5.3-5ubuntu1.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/gnutls26/2.12.14-5ubuntu3.13

Trust: 0.1

sources: VULHUB: VHN-97430 // VULMON: CVE-2016-8610 // JVNDB: JVNDB-2016-008860 // PACKETSTORM: 141173 // PACKETSTORM: 142848 // PACKETSTORM: 143874 // PACKETSTORM: 142847 // PACKETSTORM: 142849 // PACKETSTORM: 140781 // PACKETSTORM: 141752 // PACKETSTORM: 141708 // PACKETSTORM: 140890 // CNNVD: CNNVD-201610-726 // NVD: CVE-2016-8610

CREDITS

Red Hat

Trust: 0.6

sources: PACKETSTORM: 141173 // PACKETSTORM: 142848 // PACKETSTORM: 143874 // PACKETSTORM: 142847 // PACKETSTORM: 142849 // PACKETSTORM: 141752

SOURCES

db:VULHUBid:VHN-97430
db:VULMONid:CVE-2016-8610
db:JVNDBid:JVNDB-2016-008860
db:PACKETSTORMid:141173
db:PACKETSTORMid:142848
db:PACKETSTORMid:143874
db:PACKETSTORMid:142847
db:PACKETSTORMid:142849
db:PACKETSTORMid:140781
db:PACKETSTORMid:141752
db:PACKETSTORMid:141708
db:PACKETSTORMid:140890
db:CNNVDid:CNNVD-201610-726
db:NVDid:CVE-2016-8610

LAST UPDATE DATE

2024-11-20T19:34:10.868000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-97430date:2023-02-12T00:00:00
db:VULMONid:CVE-2016-8610date:2023-02-12T00:00:00
db:JVNDBid:JVNDB-2016-008860date:2024-02-27T03:18:00
db:CNNVDid:CNNVD-201610-726date:2023-02-13T00:00:00
db:NVDid:CVE-2016-8610date:2024-01-26T17:44:24.227

SOURCES RELEASE DATE

db:VULHUBid:VHN-97430date:2017-11-13T00:00:00
db:VULMONid:CVE-2016-8610date:2017-11-13T00:00:00
db:JVNDBid:JVNDB-2016-008860date:2017-12-01T00:00:00
db:PACKETSTORMid:141173date:2017-02-20T22:47:10
db:PACKETSTORMid:142848date:2017-06-07T22:47:57
db:PACKETSTORMid:143874date:2017-08-22T05:29:02
db:PACKETSTORMid:142847date:2017-06-07T22:47:43
db:PACKETSTORMid:142849date:2017-06-07T22:48:07
db:PACKETSTORMid:140781date:2017-01-30T16:58:54
db:PACKETSTORMid:141752date:2017-03-21T14:50:40
db:PACKETSTORMid:141708date:2017-03-20T23:36:43
db:PACKETSTORMid:140890date:2017-02-02T02:05:34
db:CNNVDid:CNNVD-201610-726date:2016-10-25T00:00:00
db:NVDid:CVE-2016-8610date:2017-11-13T22:29:00.203